Static task
static1
Behavioral task
behavioral1
Sample
ff4c4890b04891c46530471ce77cc466_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff4c4890b04891c46530471ce77cc466_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
ff4c4890b04891c46530471ce77cc466_JaffaCakes118
-
Size
328KB
-
MD5
ff4c4890b04891c46530471ce77cc466
-
SHA1
1ce25ea72edf3a6186dc57c9d4a7fdc172dc13e6
-
SHA256
4440d48650ed75b705b2f3360fccefd93b0a54a98f390c049dd9cb74e9a34b15
-
SHA512
10ef9b78987625f0c9a06916f4b37347f0115a0ec1e8066b3da747ae9baff96339fb5d4827cdb1b88c56cf2d9bd23aecc5350fc5683cd2df1274ce9011ab2790
-
SSDEEP
768:QAq61WxjEUK0lzznXoTXJcJuV22CgCgfCJJJXhfyccQ1:QAFkd2q05CgCgCyc/1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ff4c4890b04891c46530471ce77cc466_JaffaCakes118
Files
-
ff4c4890b04891c46530471ce77cc466_JaffaCakes118.exe windows:4 windows x86 arch:x86
04b33b903061a3702e02500c2d46d583
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
EnumWindows
EmptyClipboard
VkKeyScanA
keybd_event
IsWindow
SetFocus
wsprintfA
GetMenu
FindWindowExA
SendMessageA
BlockInput
OpenClipboard
GetWindowTextA
SetClipboardData
CloseClipboard
CharLowerA
FindWindowA
ShowWindow
BringWindowToTop
SetForegroundWindow
ole32
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
SysFreeString
VariantClear
VariantInit
SysAllocString
msvcrt
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
exit
_XcptFilter
_exit
_onexit
__dllonexit
wcslen
strcat
memcpy
_vsnprintf
strcmp
strtok
srand
memcmp
_snprintf
memset
atoi
strchr
strncpy
rand
strcpy
strlen
strstr
??2@YAPAXI@Z
_EH_prolog
__CxxFrameHandler
malloc
sprintf
realloc
free
_stricmp
_controlfp
urlmon
URLDownloadToFileA
kernel32
GetLogicalDriveStringsA
GlobalAlloc
GetStartupInfoA
WideCharToMultiByte
MultiByteToWideChar
TerminateThread
lstrcpyA
lstrcmpA
lstrcpynA
GetSystemTime
ReadFile
GlobalLock
GlobalUnlock
FindFirstFileA
SetCurrentDirectoryA
GetFullPathNameA
FindNextFileA
FindClose
GetFileSize
SetFilePointer
CreateFileMappingA
GetDriveTypeA
lstrcatA
CreateDirectoryA
lstrlenA
CreateFileA
WriteFile
GetWindowsDirectoryA
SetFileAttributesA
CopyFileA
GetFileAttributesA
GetVersionExA
GetLocaleInfoA
CreateMutexA
GetTickCount
ReleaseMutex
ExitThread
LoadLibraryA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
ExpandEnvironmentStringsA
CreateProcessA
CloseHandle
WaitForSingleObject
lstrcmpiA
GlobalFree
CreateThread
GetLastError
GetTempPathA
Sleep
InterlockedDecrement
ExitProcess
UnmapViewOfFile
MapViewOfFile
advapi32
RegQueryValueExA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
ws2_32
connect
socket
ioctlsocket
closesocket
Sections
.text Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ